Sciweavers

780 search results - page 117 / 156
» Bandwidth Modeling and Estimation in Peer to Peer Networks
Sort
View
IEAAIE
2010
Springer
14 years 9 months ago
Strategies for Incorporating Knowledge Defects and Path Length in Trust Aggregation
The ability for a user to accurately estimate the amount of trust to be placed in a peer user is gaining more and more attention in social network applications. Trust aggregation p...
Nele Verbiest, Chris Cornelis, Patricia Victor, En...
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 6 months ago
Scalable Resilient Overlay Networks Using Destination-Guided Detouring
— Routing policies used in the Internet tend to be restrictive limiting communication between source-destination pairs to one route, when often better alternates exist. To avoid ...
Sameer Qazi, Tim Moors
PAM
2010
Springer
15 years 6 months ago
Characterizing the Global Impact of P2P Overlays on the AS-Level Underlay
Abstract. This paper examines the problem of characterizing and assessing the global impact of the load imposed by a Peer-to-Peer (P2P) overlay on the AS-level underlay. In particu...
Amir Hassan Rasti, Reza Rejaie, Walter Willinger
P2P
2006
IEEE
15 years 5 months ago
Cost-Based Analysis of Hierarchical DHT Design
Flat DHT architectures have been the main focus of the research on DHT design so far. However, there have been also a number of works proposing hierarchical DHT organizations and ...
Stefan Zöls, Zoran Despotovic, Wolfgang Kelle...
SAC
2009
ACM
15 years 4 months ago
Latency-aware leader election
Experimental studies have shown that electing a leader based on measurements of the underlying communication network can be beneficial. We use this approach to study the problem ...
Nuno Santos, Martin Hutle, André Schiper